General
-
Target
d2e1358df53c86e937cd0ebce904ce37_JaffaCakes118
-
Size
783KB
-
Sample
240907-1day4awenj
-
MD5
d2e1358df53c86e937cd0ebce904ce37
-
SHA1
382a37b7e90e3847ba896023eb52ffca478c46c8
-
SHA256
08e552f54e65ed655a29c9e3b8bbb71157eeec1239abec564e69e715e9e2ac7a
-
SHA512
2392dee145eee3babb0da5945a6cc21ed4ad9b8332f0dfd0842009970d695d109b321bdbdc51f2e8eccb0fbdb6290c9505fd5cbb43c8cd585dc233f8386ab44c
-
SSDEEP
24576:UavzvJ9HV8sY5ocz8RDf/7HFpgZE91H5D5F:UabfHS8RxxD
Static task
static1
Behavioral task
behavioral1
Sample
d2e1358df53c86e937cd0ebce904ce37_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2e1358df53c86e937cd0ebce904ce37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://etruht.ga/LL0/200g-xz/cat.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d2e1358df53c86e937cd0ebce904ce37_JaffaCakes118
-
Size
783KB
-
MD5
d2e1358df53c86e937cd0ebce904ce37
-
SHA1
382a37b7e90e3847ba896023eb52ffca478c46c8
-
SHA256
08e552f54e65ed655a29c9e3b8bbb71157eeec1239abec564e69e715e9e2ac7a
-
SHA512
2392dee145eee3babb0da5945a6cc21ed4ad9b8332f0dfd0842009970d695d109b321bdbdc51f2e8eccb0fbdb6290c9505fd5cbb43c8cd585dc233f8386ab44c
-
SSDEEP
24576:UavzvJ9HV8sY5ocz8RDf/7HFpgZE91H5D5F:UabfHS8RxxD
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-